Professional Documents
Culture Documents
Empowerment Technology SHS Docs
Empowerment Technology SHS Docs
TECHNOLOGY
Quarter 1 – Module 1
ICT in the Context of Global Communication
SENIOR HIGH SCHOOL
Prepared by:
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of
the Philippines. However, prior approval of the government agency or office wherein the work is created
shall be necessary for exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included
in this book are owned by their respective copyright holders. Every effort has been exerted to locate and
seek permission to use these materials from their respective copyright owners. The publisher and authors
do not represent nor claim ownership over them.
Development Team:
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Members: Neil A. Improgo, PhD, EPS-LRMS; Bienvenido U. Tagolimot, Jr., PhD, EPS-
ADM; Erlinda G. Dael, PhD, CID Chief; Maria Teresa M. Absin, EPS (English); Celieto B.
Magsayo, LRMS Manager; Loucile L. Paclar, Librarian II; Kim
Eric G. Lubguban, PDO II
Telefax: ____________________________________________________
E-mail Address: ____________________________________________________
SENIOR HIGH SCHOOL
EMPOWERMENT
TECHNOLOGY
Quarter 1 – Module 1
ICT in the Context of Global Communication
i
Department of Education • Republic of the Philippines
i
TABLE OF CONTENTS
Page No.
Cover Page i
Table of Contents
ii
Introduction 1
Module Content 1
Learning Competencies 2
What’s In 5
What Is It 6
Assessment 12
What’s In 17
What’s New: Activity 2.1: Shared or Not Shared? That is the Question 18
What Is It 19
What Is It
23
Assessment 28
Answer Key 30
References 31
What’s New
34
Assessment 43
ii
WHAT I NEED TO KNOW:
Overview
Hello dear learners! Welcome to this module on Empowerment Technology. This
module will help you explore the different technologies and online platforms and how
they can be used effectively. It contains activities that will let you create your own
ICT contents and evaluate existing online creation tools, platforms, and applications.
The module is self – instructional and allows you to learn in your own space, at your
own pace. So, relax and enjoy learning.
Module Content
First Quarter Module 1: ICT in the Context of Global Communication will give
you an introduction into ICT and the different online platforms that may be used for
its specific purpose. It will also tackle on online safety, security, and online etiquette.
You will be able to get tips on how to maximize the power of the Internet to assist
you in your research work through discussing research tools and evaluating relevant
and reliable websites.
Module 2: Productivity Tools will help you on using advanced knowledge in Word,
PowerPoint, and Excel applications. This module will also allow you to critic on good
qualities of web design.
To get the most of this module, here are some reminders for you:
2. Write down points for clarification and discuss this with your teacher.
on page 14.
1
6. Have fun while learning with this module. It will totally be of great use which ever
Learning Competencies
1. Compare and contrast the nuances of varied online platforms, sites, and content
to best achieve specific class objectives or address situational challenges.
3. Apply online safety, security, ethics, and etiquette standards and practice in the
use of ICTs as it would relate to their specific professional tracks.
4. Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.
2
WHAT I NEED TO KNOW
LESSON 1: What is Information and Communications
Technology?
3
WHAT I KNOW
You must be excited to flip over the pages and begin with the
lessons.
But first, please answer the pre-test to measure what topics have you known so far.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
2. What web 2.0 feature allows users to subscribe to a data plan that charges for the
amount of time spent on the internet?
A. Folksonomy B. Long Tail C. User Participation D. Application
3. What is the name of the symbol that is used to classify and categorize
information?
A. Hashtag B. Question Mark C. Asterisk D. At sign
4. What specific type of social media allows you to connect with other people?
A. Microblogging C. Media Sharing
B. Social Networks D. Social News
6. YouTube and Instagram are examples of what specific type of social media?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites
7. What specific type of social media allows its users to post their original content on
websites such as WordPress, Blogger, and Tumblr?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites
8. What type of social media allows you to manage links to various websites?
A. Blogs and Forums C. Media Sharing
B. Social Networks D. Bookmarking Sites
9. What do you call the global system of interconnected computer networks that use
servers to link billions of devices worldwide?
A. Websites B. Web browser C. Internet D. World Wide Web
4
10. What type of web page is classified as a dynamic page?
A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0
WHAT’S IN
Reflect on the following questions:
How many times have you checked your phone this morning?
How many updates have you posted on Facebook, Twitter, or
Instagram today?
Do you use the internet/ mobile for an hour after you woke up this
morning?
Have you followed a celebrity/ a crush on his/ her social media
I
nformation and Communications Technology (ICT) often deals with the use of
different technological inventions like mobile phones, telephones, computer, Internet,
and other devices, as well as software and applications to locate, save, send, and
manipulate information. ICT has greatly contributed to how easy our lives has been
5
today. Our gadgets have become part of our necessity that we check on them after
we wake up. It made communication easier. We can use cellular phones that are
designed for communicating with other people even they are miles away from us. It
has also assisted us in our work since there are Internet-based jobs. It has
revolutionized our education and in the modernization of our economy.
6
12. I have experience with video conferencing (ex. Skype).
Did you agree to all or most of the questions? If so, then you must have
experienced using the different online platforms and sites!
WHAT IS IT
7
let users navigate from one web page to another via the hyperlinks embedded in the
documents. These documents may also contain any combination of computer data,
including graphics, sounds, text, video, multimedia and interactive content that runs
while the user is interacting with the page. The Web has enabled individuals and
organizations to publish ideas and information to a potentially large audience online
at greatly reduced expense and time delay.
Types of Web Pages
• Web 1.0 or The Web. It is the first stage of the World Wide Web evolution. It is
a flat or stationary page since it cannot be manipulated by the user.
• Web 2.0 or The Social Web allows users to interact with the page, the user
may be able to comment or create a user account. Most website that we visit
today are Web 2.0.
• Web 3.0 or Semantic Web. The semantic web provides a framework that
allows data to be shared and reuse to deliver web content specifically
targeting the user. Search Engine will learn about you and your habits from
each search you perform and will gather details about you from your previous
activities like likes and social postings and present the answers as per your
preferences.
8
RICH USER dynamic content that is responsive to user input (e.g., a user
EXPERIENCE can "click" on an image to enlarge it or find out more
information)
USER the owner of website is not the only one who is able to put
PARTICIPATION content. Others are able to place a content on their own by
means of comments, reviews, and evaluation.
LONG TAIL services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan
that charges you for the amount of time you spent in the
Internet, or a data plan that charges you for the amount of
bandwidth you used.
SOFTWARE AS users will subscribe to a software only when needed rather
A SERVICE than purchasing them.
DIRECTIONS: Using the Internet, look for the webpages of the pages listed below.
Evaluate whether they are Web 1.0, Web 2.0, or Web 3.0. Write your answers in
your activity notebook.
2. 7.
3. 8. Encyclopedia Britannica
5. 10.
Presentation or Visualization
9
Cloud Computing
File Management
Mapping
Social Media
Social Networks. These sites allow you to connect with other people
with the same interests or background.
Bookmarking Sites. These are sites that allow you to store and
manage links to various websites and resources.
Social News. These are sites that allow users to post their own news
items or links to other news sources.
Media Sharing. These are sites that allow you to upload and share
media content like images, music, and video. Media sharing sites can
be specific for video sharing, photo sharing, slide sharing, social
bookmarking, and gaming.
10
Microblogging. These are sites that focus on short updates from the
user. Those subscribed to the user will be able to receive these
updates. Posts are brief that range typically from 140 – 200 characters.
Blogs and Forums. These are websites that allow users to post their
content. Other users can comment on the said topic.
WHAT CAN I DO
ACTIVITY 1.3: Which Website Is It?
DIRECTIONS: Listed below are some of the platforms. Complete the table below by
providing name of website and a short description using the internet. Write your
answers on your notebook.
PLATFORMS NAMES OF WEBSITES DESCRIPTION
Presentation or
Visualization
Cloud Computing
File Management
Mapping
Social Networks
Social News
11
Microblogging
Blogs and
Forums
2. How do the different online platforms help you as a student in your chosen track?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
12
Completeness (5 points)
Does your response directly answer 5 4 3 2 1
each part of the question(s)?
Knowledge (10 points)
Does your response clearly show you
have read and understand the lesson
content by correctly defining key
terms, key persons and summarizing 10 - 9 8-7 6-5 4-3 2-1
concepts?
Have you made inferences based on
this knowledge to personal or
modernday applications?
Writing Skills (5 points)
Do you write clearly, in complete
sentences, with minimal errors in 5 4 3 2 1
grammar and spelling?
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write
your answers on a separate sheet of paper or in your notebook.
1. What type of web provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Website
13
2. Which of the following is an example of sites under web 2.0?
A. Facebook B. YouTube C. Wikipedia D. All of the above
4. Twitter statuses are only composed of a few characters. What type of social media
site does Twitter belong?
A. Micro blogging C. Social Networks
B. Media Sharing D. Bookmarking Sites
5. Social networks are sites that allow you to connect with other people having the
same interests. It allows you to share your own news and other news from other
sources.
6. The Philippines is considered as the “ICT Hub in Asia.” The ICT Industry shares
19.3% of the total employment population in the Philippines coming from the
government agencies.
7. Marisa wants to publish her collections of original poems online. Which online
platform must she do this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
8. Watson is creating a cover video of his favorite song. Which online platform must he
publish this?
A. Social News B. Bookmarking Site C. YouTube D. Blogs
9. Cathy has created a very good slideshow presentation on a certain topic, and she
wants to share it to other teachers around the world. Which online platform must
she publish this?
A. Presentation Platforms C. File Management Platforms
B. Cloud Computing Platforms D. Social Media Platforms
10. What is the name of the symbol that is used to classify and categorize information?
A. Hashtag B. Question Mark C. Asterisk D. At sign
14
15
technology. Retrieved on May 19, 2020.
https://www.slideshare.net/maricelbaldomerodelara/lesson -1empowerment-
1. De Lara, Maricel. (2016, Nov. 3). Empowerment Technology. Retrieved from
1 . C 6 . C
2 . D 7 . D
3 . A 8 . C Students’ answers may vary. It
is necessary for the teacher to
4 . A 9 . A also check their answers with
the Internet.
5 . A 10 . A
POST-TE ACTY 1.3: Which Website is It?
1 . Web 63.0 . Web 3.0 1 . A 6 . C
2 . Web 73.0 . Web 2.0 2 . B 7 . A
3 . Web 81.0 . Web 1.0 3 . A 8 . D
4 . Web 92.0 . Web 1.0 4 . B 9 . C
5 . Web 2.0
10 . Web 1.0 5 . A 10 . C
ACTY 1.2: Where do I belong? PRE -TEST
ANSWER KEY
2. Educational Technology: Students Readiness and Self – Assessment.
Retrieved from https://www.surveymonkey.com/r/ET_studentreadiness.
Retrieved on May 19, 2020.
3. Quiambao, A. (2019, Sep 8). Online platforms for ICT Content Development.
Retrieved from https://www.slideshare.net/AngelitoQuiambao/online platforms-for-
ict-content-development-169954837. Retrieved on May
2
2
0
020.
,
WHAT I NEED TO KNOW
LESSON 2: Online Safety, Security and Netiquette
The internet is the guiding technology of the Information Technology Age just
as the electrical engine was of the Industrial Age. In these times, more and more
people are already engaged in the use of technology. These people who are raised
in a digital, media-saturated world are called digital natives. No doubt, the Internet
has been very useful to us but with the rise of instant messaging, chat rooms, emails
and social networking sites, it can also bring trouble - from cyberbullying to more
serious Internet dangers, including exposure to sexual predators. Thus, internet
safety is always our primary concern.
WHAT I KNOW
I bet you are ready to know if you have practiced online safety, aren’t you? But
before that, take time to answer the pre-test to gauge how much you know about the
lesson.
16
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or on your notebook.
1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
6. What type of online threat happens when an attacker uses electronic devices to
do unwanted surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D.
Cyberstalking
7. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming
17
8. What type of information should you avoid giving when using the internet?
18
A. Phone number B. Profile Picture C. Shirt Size D. Religion
10. You get an email telling you that you won a hundred thousand without joining
in a competition. You should ____________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge
WHAT’S IN
Read the headlines found below and try to reflect on the questions that follow.
ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.
WHAT’S NEW
A
CTIVITY 2.1: Shared or Not Shared? That is the Question
DIRECTIONS: Read and reflect each item carefully. Copy the table below on your
notebook and check the space whether you have shared or not shared these pieces
of information in all your social media accounts.
TYPE OF INFORMATION SHARED NOT SHARED
First Name
Middle Name
Last Name
Your Address
Your Birthday
20
______________________________________________________________
3. Based from your answers above, do you think you are safe when using the
Internet? Why?
______________________________________________________________
______________________________________________________________
21
______________________________________________________________
WHAT IS IT
22
when using the internet to ensure that the users as well as their computers and
personal information are safe from crimes associated with using the internet. Below
are personal information that must be kept confidential.
There are numerous delinquencies that can be committed on the internet such
as stalking, identity theft, privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is
a reputable business having a secure service. To make sure that you are in a
secured network, the website address should begin with “https://’ as opposed
to “http://”. Never access your accounts by following an email link, instead type
your URL by yourself.
Regularly review your privacy settings in your online accounts to make sure
you are not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data
before leaving.
24
A WHAT CAN I DO
CTIVITY 2.2: Can You Keep It Private?
2. Do you have the same passwords for all your accounts? A. Yes. That is how I
remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my accounts.
3. Choose which image below describes how you feel about sharing your
password with your boyfriend/ girlfriend?
Image source: https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.
A
C
B
D
25
4. Your parents bought you your first cellphone. How will you share your
cellphone number?
A
Do not share your cellphone number to
anyone.
B
Post your cellphone number in your
social media account.
C
Share your cellphone number only in
person.
D
Post your cellphone number in your
group chat.
e
WHAT IS IT
s
son 2.2: Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web
evolved over the years, many internet predators have been playing on vulnerabilities
to attack computers and retrieve sensitive data from individuals. Half the time, we
aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which utilize
HTTP or HTTPS protocols, but may also employ other protocols and components,
26
such as links in email or Instant Messaging apps, or any malware attachments on
servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a
broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised
as an email from a legitimate, trustworthy source. The message is meant to
lure you into revealing sensitive or confidential information.
27
Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html
Internet robots are also known as spiders, crawlers, and web bots. It is a
software application that is programmed to do certain tasks. Bots are
automated, which means they run according to their instructions without a
human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are
"bad" and are programmed to break into user accounts, scan the web for
28
contact information for sending spam, or perform other malicious activities. If
it's connected to the Internet, a bot will have an associated IP address.
Spams are unsolicited emails, instant messages coming from recipients that
are not granted verifiable permission for the message to be sent. Spam
messages can be damaging if you open or respond to it.
29
Cyberbullying refers to the act of tormenting, harassing, or embarrassing
another person using the internet.
30
ACTIV
WHAT CAN I DO
ITY 2.3: Show Me How You Hashtag
Direction: Look at the following images and create a hashtag based on the type of
online threat represented by each image. Write your answers in your activity
notebook.
1.
#_______________________
2. # _____________________
5. # ___________________________
31
3. # ________________________ 4. # _____________________
Image source: http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-
telco-player-to-benefit-consumers-says-globe-telecom/
From all you have learned in Lesson 2, why is there a need to “think before you
click?”
Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-
click/
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
1. What type of malicious program is designed to replicate itself and transfer from
one computer to another either through the internet or local networks or data
storage like flash drives and CDs?
A. Adware C. Worms and Virus
32
B. Spyware D. Ransomeware
a
r
e
ANSWER KEY
j udged by how you look - your profile picture is
important.
34
. B 10 . D 5 A nswers may vary.
A . 9 . D 4
A . 8 . B 3
ACTY 2.2:
. C 4 . B 2
B . 7 . B 2
Can . B 5 . A 3 . A 1 You
D . 6 . A 1
Keep It Private?
B . 10 . A 5 . #Phishing . #Adware
4 2
C . 9 . D 4 #Virus
. #Pharming 5 1 . #Spyware
. #Worms 3
B . 8 . B 3
P OST -TEST
D . 7 . A 2
B . 6 . C 1
Images
1. https://twitter.com/Parkster00/status/1246347088625045504
2. Shea, Virginia. (2011). Netiquette. Retrieved from
http://www.albion.com/netiquette/introduction.html. Retrieved on May 22,
2020.
3. https://searchsecurity.techtarget.com/definition/phishing
4. https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-
websitepharming.html
5. Chua, Ryan (2011, May 24). ABS-CBN News. Are you a victim of
cyberstalking. Retrieved from https://news.abs-cbn.com/nation/05/24/11/are-
youvictim-cyber-stalking. Retrieved on May 22, 2020.
6. Andrade, Jeannette. (2012, June 2). Teen arrested for Facebook blackmail.
Retrieved from https://technology.inquirer.net/11673/teen-arrested-
forfacebook-blackmail. Retrieved on May 22, 2020.
7. https://www.avg.com/en/signal/what-is-spyware
8. https://itigic.com/tag/adware/
9. https://dlpng.com/png/6702600
10.https://www.gtmaritime.com/free-phishing-penetration-test/
11.http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-
tobenefit-consumers-says-globe-telecom/
12.https://shieldguide.wordpress.com/2017/03/12/think-before-
you-click/
36
The Internet has made our lives easier especially in terms of doing research. By
browsing the internet, we can access limitless topics. Web-based catalogs are
available in many libraries to assist researchers in locating printed books, journals,
government documents and other materials. The biggest obstacle facing all
researchers on the internet is how to effectively and efficiently access the vast
amount of information available (The Internet: Research Tools, 2013).
WHAT I KNOW
Before we take on another journey towards exploring the great capacity of the
internet into research, kindly take time to answer the following questions for your
pretest.
Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper.
37
3. Which of the following is a search engine?
A. Netscape C. Elsevier
B. Yahoo D. Macromedia Flash
A
c WHAT’S IN
t
ivity 3.1: What’s In My Name?
Direction: Write all your answers in your activity notebook.
1. Using the Internet, try to search for your complete name.
2. Write down how many sites have featured your personal name and what is
written about you.
3. Answer the following:
____________________________________________________
There are billions of information on the web and it is a challenge for us to truly find
which information is reliable and relevant. Here are some tips you may use to be
able to look for relevant and reliable sources:
Search Engines are websites used for retrieval of data, files, or documents
from data bases. Some search engines we use today are:
Anatomy of a URL
A URL is one type of Uniform Resource Identifier (URI). It is a generic
term for all types of names and addresses that refer to objects on the
world wide web. Knowing the URL endings will give you clues to who is
sponsoring the website and help evaluate the sources.
39
https://www.searchenginejournal.com/alternative-searchengines/271409/#close
5
1 2 3 4 6 7
Popular Domains
Top- level Domains Country code top level domains
.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network
A B
40
c. Boolean “not” – this operator will find
pages that do not include search term
immediately following it.
Ex. A not B
A B
3. Plus (+) – indicates that the word after the sign is a required word must be
found in search. Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is not
required on the result. Example: Jaguar speed –car
7. Finding Documents – using the filetype refines the search for documents
on the web.
o filetype:pdf o
filetype:doc o
filetype:xls
Ex. ICT in the Philippines pdf
8. Searching Site – the sites find webpage from a website.
Ex.: National Geographic information in Australia
Search: Australia site: NationalGeographic.com
41
42
Activit
y 3.2: WHAT IS IT
Can You Find Me?
URL: _______________________________________________________
Title of Article: _______________________________________________
e WHAT’S NEW
The web provides access to some excellent information and can also give
access to those that are irrelevant and outdated. Here is some checklist that you can
use to evaluate your website:
1. Authority. It reveals that the person, institution or agency responsible for a
site has the qualifications and knowledge to do so. Evaluating a web site for
authority:
Authorship: It should be clear who developed the site.
Contact information should be clearly provided: e-mail
address, snail mail address, phone number, and fax
number.
Credentials: the author should state qualifications,
credentials, or personal background that gives them
authority to present information.
Check to see if the site supported by an organization or a
commercial body
44
2. Purpose. The purpose of the information presented in the site should be
clear. Some sites are meant to inform, persuade, state an opinion, entertain,
or parody something or someone. Evaluating a web site for purpose:
Does the content support the purpose of the site?
Is the information geared to a specific audience (students,
scholars, general reader)?
Is the site organized and focused?
Are the outside links appropriate for the site?
Does the site evaluate the links?
39
3. Coverage. This refers to how comprehensive the website is in their
discussion of certain topics. Evaluating a web site for coverage:
Does the site claim to be selective or comprehensive?
Are the topics explored in depth?
Compare the value of the site’s information compared to
other similar sites.
Do the links go to outside sites rather than its own?
Does the site provide information with no relevant outside
links?
4. Currency. It refers to: (1) how current the information presented is, and (2)
how often the site is updated or maintained. It is important to know when a
site was created, when it was last updated, and if all of the links are current.
Evaluating a web site for currency involves finding the date information was:
first written
placed on the web last revised
6. Accuracy. It refers to the credibility of the website. Evaluating a web site for
accuracy:
Reliability: Is the author affiliated with a known, respectable
institution?
References: do statistics and other factual information
receive proper references as to their origin?
Is the information comparable to other sites on the same
topic?
Does the text follow basic rules of grammar, spelling and
composition?
Is a bibliography or reference list included?
46
Print out of the website
41
1. What is the URL or web address of the web site you are evaluating?
http://_____________________________________________________
What authorship clues did the URL (web address) provide? Check all that
apply:
48
What is the purpose of the web page or site? Check all that apply:
In your own words, briefly describe the purpose of the web site:
______________________________________________________________
______________________________________________________________
CURRENCY
I couldn’t tell
It was updated on:___________________________________
49
Is the site well maintained?
I couldn’t tell
Yes
No
ASSESSMENT
Website evaluation is an important skill that everyone should practice and
master through time. It is always important to learn which information are relevant
and reliable to be able to avoid misinformation and be a victim of fake news.
Direction: Read each item carefully and choose the letter of the correct
answer. Write your answers on a separate sheet of paper or in your notebook.
50
2. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World Wide
Web
D. A search engine
ANSWER KEY
. D 2 . C 2
. A 1 . B 1
ACTY 3.2: Can You Find Me?
Answers may vary.
5. An article that only presents one point of view or omits facts is biased.
A. True B. False
51
in
52
For inquiries or feedback, please write or call:
Department of Educat
ion – Alternative Delivery Mode (DepEd
- ADM
Office Address: Masterson Avenue, Upper Balulang, Zone 1, Cagayan de Oro City
Cagayan de Oro– Lalawigan ng Misamis Oriental
Telefax: _______________________________________
E-mail Address:__________________
____________________
53